MilikMilik

OpenAI Urges Immediate ChatGPT Mac Security Update After Supply Chain Attack

OpenAI Urges Immediate ChatGPT Mac Security Update After Supply Chain Attack

What Happened in the OpenAI Supply Chain Attack

OpenAI has disclosed a supply chain attack that affects its macOS applications, including ChatGPT Desktop, Codex, Codex CLI, and Atlas. The incident traces back to malicious versions of TanStack npm packages, a popular open-source library used in many development projects. On a single day, an attacker pushed dozens of tampered package versions, which were capable of installing malware designed to steal developer credentials. Two OpenAI employee devices in the corporate environment installed these compromised TanStack packages. According to OpenAI, investigators observed activity consistent with the malware’s behavior, including unauthorized access and credential-focused exfiltration from a limited set of internal source code repositories. The company reports no evidence that user data, production systems, or intellectual property were accessed or altered. Nonetheless, the exposure of internal signing materials triggered a broad security response focused on protecting app integrity for Mac users.

OpenAI Urges Immediate ChatGPT Mac Security Update After Supply Chain Attack

Why Mac App Signing Certificates Matter

The core risk from this supply chain attack is the exposure of code-signing certificates used by OpenAI’s apps. These certificates allow Apple’s macOS security systems—such as Gatekeeper and notarization—to verify that software truly comes from a trusted developer. When a macOS app like ChatGPT, Codex, or Atlas is signed with a valid certificate, the operating system treats it as a legitimate application and lets it run with fewer warnings. If attackers obtain those signing materials, they could theoretically sign malicious apps so they appear to be genuine OpenAI software, potentially bypassing users’ trust checks. OpenAI notes it has found no evidence that the exposed certificates have been used to sign malware or distribute fake apps. Even so, rotating certificates and re-signing apps is a critical precaution to eliminate any opportunity for misuse in the future.

OpenAI Urges Immediate ChatGPT Mac Security Update After Supply Chain Attack

ChatGPT Mac Security Update Deadline and Affected Apps

To protect users, OpenAI has rotated its signing certificates and re-signed affected macOS apps. Apple’s macOS security protections will stop trusting older certificates after June 12, which means existing installations must be updated before that date. Older versions of ChatGPT Desktop, Codex App, Codex CLI, and Atlas signed with the previous certificates may stop functioning or receiving updates once Apple’s systems block them. Specific affected releases include ChatGPT Desktop 1.2026.125, Codex App 26.506.31421, Codex CLI 0.130.0, and Atlas 1.2026.119.1. This deadline applies to Mac users because OpenAI’s mitigation strategy centers on changing macOS signing credentials; users on other platforms do not need to take immediate action. The goal of this ChatGPT Mac security update is to ensure only newly signed, fully trusted binaries continue to run, closing any gap that exposed certificates might have created.

OpenAI Urges Immediate ChatGPT Mac Security Update After Supply Chain Attack

Step-by-Step: How Mac Users Should Update OpenAI Apps

Mac users should update directly from trusted, official sources to avoid counterfeit installers. First, open each OpenAI macOS app you use—such as ChatGPT, Codex, or Atlas—and look for a built-in “Check for Updates” option in the menu bar. If available, let the app download and install the latest version. If no in-app updater exists or the app fails to update, go to OpenAI’s official website and download the current installer, then drag the updated app into your Applications folder, replacing the old version. Avoid installing any OpenAI-branded software from links in emails, chat messages, ads, or third-party download sites. After updating, restart each app and confirm it launches without security prompts related to unidentified developers. Completing these steps before June 12 ensures your OpenAI apps remain usable and properly validated by macOS security systems.

ChatGPT Malware Warning Fix and Ongoing Safety Tips

Some Mac users previously encountered false malware warnings when launching OpenAI apps, which is a separate issue from this supply chain attack. Those alerts often stemmed from macOS Gatekeeper or notarization checks temporarily flagging apps while certificates or notarization statuses were being updated. In many cases, these warnings can be resolved by ensuring the app comes from a verified source, then allowing it through your Mac’s Security & Privacy settings. However, users should never bypass warnings for apps obtained from untrusted links. For a practical ChatGPT malware warning fix, first confirm you downloaded the app from OpenAI’s official channels, then update to the latest version that uses the new signing certificates. Continue practicing basic hygiene: keep macOS and your apps updated, avoid sideloading software, and be skeptical of unexpected “OpenAI,” “ChatGPT,” or “Codex” installers appearing in email or messaging platforms.

Comments
Say Something...
No comments yet. Be the first to share your thoughts!